Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2021:2291

Опубликовано: 08 июн. 2021
Источник: rocky
Оценка: Important

Описание

Important: container-tools:2.0 security update

The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

  • runc: vulnerable to symlink exchange attack (CVE-2021-30465)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
cockpit-podmannoarch1.module+el8.5.0+770+e2f49861cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm
conmonx86_641.module+el8.5.0+770+e2f49861conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm
containernetworking-pluginsx86_644.module+el8.5.0+770+e2f49861containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm
containers-commonx86_644.module+el8.5.0+770+e2f49861containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm
container-selinuxnoarch1.module+el8.5.0+770+e2f49861container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm
critx86_649.module+el8.5.0+681+c9a1951fcrit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
criux86_649.module+el8.5.0+681+c9a1951fcriu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
fuse-overlayfsx86_641.module+el8.5.0+770+e2f49861fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm
python3-criux86_649.module+el8.5.0+681+c9a1951fpython3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm
python-podman-apinoarch0.2.gitd0a45fe.module+el8.5.0+770+e2f49861python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 8.5
ubuntu
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

CVSS3: 7.5
redhat
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

CVSS3: 8.5
nvd
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

CVSS3: 8.5
debian
около 4 лет назад

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Dire ...

suse-cvrf
около 4 лет назад

Security update for runc